期刊文献+

基于行为监控的虚拟化服务安全增强方案研究

Enhance Safety Scheme of Vinual Services Based on Behavior Monitoring
在线阅读 下载PDF
导出
摘要 虚拟化服务对基于行为监控的客户虚拟机实施访问控制,以监控客户对受保护服务的访问行为。虚拟化服务使用运行时监控技术,通过观察到的客户虚拟机行为计算当前客户的信任度值,并强制客户执行符合其信任值级别的访问控制权限。 The virtual plaLform can let the virtual sewices(VS) based on customer behavior on the virtual machine monitor could provide more powerful functions.There is a virtual service at runtime change and refine the implementation of access control for a set of functions, access to focus on protected service. These changes by and trust related some virtual machine association. The virtual service operation monitoring, vip virtual machine behavior from observed the current trust. This paper designs the trust virtual service enhancement scheme, further enhanced virtual service multi-layer security architecture,describes trust management framework based on behavior monitoring, finally introduces the application.
作者 蒲江 张春刚
出处 《信息安全与技术》 2013年第12期33-35,共3页
关键词 虚拟化服务 动态访问控制 可信计算 virtualization service dynamic access control trusted computing
  • 相关文献

参考文献12

  • 1蒋万春,汤立,陈震.虚拟化安全问题探析[J].信息网络安全,2010(8):83-86. 被引量:14
  • 2H.Raj,K.Schwan. 02S2:Enhanced Object-based Virtualized Storage[J].Operatlng Systems Review,2008,(10).
  • 3S.Berger,R.C+aceres,K.A.GOldman,R.Perez,R.Sailer, L.van Doorn. vTPM:Virtualizing the Trusted Platform Module[A].2006.
  • 4L.S.Clair,J.Schiffman,T.Jaeger,P.McDaniel. Establishing and Sustaining System Integrity via Root Of Trust Installation[A].2007.
  • 5程川.一种基于Xen的信任虚拟机安全访问设计与实现[J].计算机与数字工程,2010,38(3):109-111. 被引量:13
  • 6B.Jansen,H.G.V.Ramasamy,M.Schunter. Policy enforcement and compliance proofs for xen Virtual machines[A].2008.
  • 7J.Kong,K.Schwan,M.Lee,M.Ahamed. ProtectIT:Trusted Distributed Services Operating On Sensitive Data[A].2008.
  • 8R.NathUji,K.SChwan. VirtualPower:Coordinated Power Management in Virtualized Enterprise Systems[A].2007.
  • 9B.D.Payne,M.Carbone,W.Lee. Secure and Flexible Monitoring of Virtual Machines[A].2007.
  • 10戴祝英,左禾兴.基于角色的访问控制模型分析与系统实现[J].计算机应用研究,2004,21(9):173-175. 被引量:22

二级参考文献23

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:119
  • 3P. M. Chen, B. D. Noble. When virtual is better than real [C]//Proceedings of the 8th Workshop on Hot Topics in Operating Systems, Washington, DC, USA, IEEE Computer Society, 2001 : 133.
  • 4Tal Garfinkel, Ben Pfaff, Jim Chow, et al. Terra: A Virtual Machine-Based Platform for Trusted Computing [C]//Proc. of ACM Symposium on Operating Systems Principles (SOSP), 2003.
  • 5P. Barham, B. Dragovic, K. Fraser, et al. Xen and the Art of Virtualization[C]//Proceedings of the 19th ACM SOSP,2003(8) : 164-177.
  • 6Trusted Computing Group. TPM Main Specification Level 2 Version 1. 2, Revision 103 Part a-Commands [EB/OL]. http.//www, trustedcomputinggroup, org, 2005.
  • 7Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu , Using Virtual Machines to Do Cross- Layer Damage Assessment, VMSec workshop of CCS'08.
  • 8lonut Constandache, Aydan Yumerefendi, Jeff Chase, Secure Control of Portable Images in a Virtual Computing Utility , VMSec workshop of CCS'08.
  • 9Heidar Pirzadeh, Danny Dub 6 , VEP: a Virtual Machine for Extended Proof-Carrying Code, VMSec workshop of CCS'08.
  • 10William Arbaugh, Brandon Baker, Hyper-V Security, talking on VMSec workshop of CCS'08.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部